A Survey of Secure Routing in Ad Hoc Networks
暂无分享,去创建一个
[1] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[2] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[3] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[4] 张友坤,et al. A Security Architecture for Mobile Ad Hoc Networks , 2005 .
[5] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[6] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[7] Zygmunt J. Haas,et al. Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..
[8] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[9] Hitesh Tewari,et al. Real-time intrusion detection for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[10] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[11] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[12] H Deng,et al. ROUTING SECURITY IN AD HOC NETWORKS , 2002 .
[13] André Weimerskirch,et al. A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.
[14] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[15] Helena Szczerbicka,et al. Artificial Immune Systems: Survey and Applications in Ad Hoc Wireless Networks , 2006 .
[16] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[17] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[18] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[19] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[20] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[21] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[22] Martin Mauve,et al. A survey on congestion control for mobile ad hoc networks , 2007, Wirel. Commun. Mob. Comput..
[23] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[24] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[25] Janne Lundberg. Routing Security in Ad Hoc Networks , 2000 .
[26] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[27] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[28] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[29] Imrich Chlamtac,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.
[30] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[31] Udo W. Pooch,et al. Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.
[32] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[33] Ejaz Ahmed,et al. Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks , 2006 .
[34] Jing Liu,et al. Secure Routing for Mobile Ad Hoc Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).